CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
Briefly

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads
"The trojanized software was distributed both as ZIP archives and as standalone installers for the aforementioned products. These files contain a legitimate signed executable for the corresponding product and a malicious DLL, which is named 'CRYPTBASE.dll' to leverage the DLL side-loading technique."
"The malicious DLL, for its part, contacts an external server and executes additional payloads, but not before performing anti-sandbox checks to sidestep detection. The end goal of the campaign is to deploy STX RAT, a RAT with HVNC and broad infostealer capabilities."
"STX RAT exposes a broad command set for remote control, follow-on payload execution, and post-exploitation actions (e.g., in-memory execution of EXE/DLL/PowerShell/shellcode, reverse proxy/tunneling, desktop interaction)."
CPUID, a website hosting hardware monitoring tools, was compromised for under 24 hours to serve malicious executables and deploy STX RAT. The breach occurred from April 9 to April 10, with download links for legitimate software replaced by malicious URLs. CPUID confirmed the attack was due to a compromise of a secondary API, but original signed files remained unaffected. The trojanized software included a legitimate executable and a malicious DLL named 'CRYPTBASE.dll', which executed additional payloads while avoiding detection. STX RAT offers extensive remote control and infostealer capabilities.
Read at The Hacker News
Unable to calculate read time
[
|
]